• Title/Summary/Keyword: Exploit

Search Result 1,236, Processing Time 0.027 seconds

The Design of Optimized Type-2 Fuzzy Neural Networks and Its Application (최적 Type-2 퍼지신경회로망 설계와 응용)

  • Kim, Gil-Sung;Ahn, Ihn-Seok;Oh, Sung-Kwun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.8
    • /
    • pp.1615-1623
    • /
    • 2009
  • In order to develop reliable on-site partial discharge (PD) pattern recognition algorithm, we introduce Type-2 Fuzzy Neural Networks (T2FNNs) optimized by means of Particle Swarm Optimization(PSO). T2FNNs exploit Type-2 fuzzy sets which have a characteristic of robustness in the diverse area of intelligence systems. Considering the on-site situation where it is not easy to obtain voltage phases to be used for PRPDA (Phase Resolved Partial Discharge Analysis), the PD data sets measured in the laboratory were artificially changed into data sets with shifted voltage phases and added noise in order to test the proposed algorithm. Also, the results obtained by the proposed algorithm were compared with that of conventional Neural Networks(NNs) as well as the existing Radial Basis Function Neural Networks (RBFNNs). The T2FNNs proposed in this study were appeared to have better performance when compared to conventional NNs and RBFNNs.

Zone Clustering Using a Genetic Algorithm and K-Means (유전자 알고리듬과 K-평균법을 이용한 지역 분할)

  • 임동순;오현승
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.1
    • /
    • pp.1-16
    • /
    • 1998
  • The zone clustering problem arising from several area such as deciding the optimal location of ambient measuring stations is to devide the 2-dimensional area into several sub areas in which included individual zone shows simimlar properties. In general, the optimal solution of this problem is very hard to obtain. Therefore, instead of finding an optimal solution, the generation of near optimal solution within the limited time is more meaningful. In this study, the combination of a genetic algorithm and the modified k-means method is used to obtain the near optimal solution. To exploit the genetic algorithm effectively, a representation of chromsomes and appropriate genetic operators are proposed. The k-means method which is originally devised to solve the object clustering problem is modified to improve the solutions obtained from the genetic algorithm. The experiment shows that the proposed method generates the near optimal solution efficiently.

  • PDF

COMPARATIVE STUDIES ON MANUAL,ANIMAL DRAWN,TWO WHEEL TRACTOR AND FOUR WHEEL TRACTOR OPERATED TILLAGE OPERATION IN SWAZILAND

  • Nath, Surya
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1993.10a
    • /
    • pp.1013-1025
    • /
    • 1993
  • Agriculture in Swaziland is the most important sector of the economy from the stand point of export earning, rural employment and dependency for family food. But, inspite of 65.5 percent of the household being busy in food production for family consumption in Swaziland, the import bill of food and live animals is rising from E119.7268 million in 1987/90 (An.St.Bul.1988) . A typical farm size, based on holding's growing crops, is only 1.93 ha which may prohibit owning a four wheel tractor for farm operations. The traditional hand tools are just not efficient and comfortable to operate in order to exploit full potential of the land. There are over 120.000 draught animals which have potential to be utilized in farming. The two wheel-tractor is another energy source which can be used for many farm-operations.

  • PDF

Edge-Based Fast Intra Mode Decision in HEVC

  • Na, Sangkwon;Lee, Wonjae;Lee, Kyohyuk;Yoo, Kiwon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2013.06a
    • /
    • pp.180-181
    • /
    • 2013
  • High efficiency video coding (HEVC) appears due to the demand on high compression video coding beyond H.264/AVC in ultra-high definition (UHD) videos. As for intra prediction, HEVC has 35 prediction modes while H.264/AVC has 9 intra modes. To exploit the spatial correlation, we adopt an edge detection method, establish the edge map, and adaptively select the candidate modes using the acquired edge information in a block. The number of the candidate modes is determined through trade-off between computational complexity and coding efficiency. Besides, the range of coding unit sizes is determined using the uniqueness of the edge directions for the given image block. As a result, we reduced the encoding time by 56.8% at the cost of 2.5% BD-BR increase on average compared to Full modes at the HEVC reference software (HM 6.0 [1]).

  • PDF

A Study on Modular Min (Modular MIN에 관한 연구)

  • 장창수;최창훈;유창하
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.2
    • /
    • pp.103-111
    • /
    • 2002
  • In parallel application programs with a localized communication, even if the MINs have lour diameters, overall system performance degrades when compared to the hypercube and tree structure. The reason is that it is impossible for MINs to provide some mechanisms for clustering to exploit the locality of reference. However proposed MIN can be constructed suitable for localized communication by providing the shortcut path and multiple paths inside the processor-memory duster which has frequent data communications. Therefore proposed MIN achieves enhanced performance in parallel application program with a localized communication.

  • PDF

A Service-Oriented Architecture for Computational Creativity

  • Veale, Tony
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.159-167
    • /
    • 2013
  • Creativity is a long cherished and widely studied aspect of human behavior that allows us to re-invent the familiar, and to imagine the new. Computational creativity (CC) is a newly burgeoning area of creativity research that brings together academics and practitioners from diverse disciplines, genres and modalities, to explore the potential of computers to be autonomously creative, or to collaborate as co-creators with people. We describe here an architecture for creative Web services that will act as a force magnifier for CC, both for academic research, and for the effective deployment of real CC applications in industry. For researchers, this service-oriented architecture supports the pooling of technologies in a robust interoperable framework, in which CC models are conceived, developed and migrated from lab settings to an industrial strength platform. Industry developers, for their part, will be able to exploit novel results of CC research in a robust, low-risk form, without having to re-implement algorithms from a quickly moving field. We illustrate the architecture with the first of a growing set of creative Web services that provide robust figurative language processing on demand.

A Topic Modeling Approach to Marketing Strategies for Smartphone Companies (소셜미디어 토픽모델링을 통한 스마트폰 마케팅 전략 수립 지원)

  • Cha, Yoon-Jeong;Lee, Jee-Hye;Choi, Jee-Eun;Kim, Hee-Woong
    • Knowledge Management Research
    • /
    • v.16 no.4
    • /
    • pp.69-87
    • /
    • 2015
  • Given the huge number of data produced by its users, SNS is a great source of customer insights. Since viral trends in SNS reflect customers' direct feedback, companies can draw out highly meaningful business insights when such data is effectively analyzed and managed. However, while the importance of understanding SNS big data keeps growing, the methods for analyzing atypical data such as SNS postings for business insights over product has not been well studied. This study aims to demonstrate the way to exploit topic modeling method to support marketing strategy generation and therefore leverage business process. First, we conducted topic modeling analysis for twitter data of Apple and Samsung smartphones. Then we comparatively examined the analysis results to draw meaningful market insights about each smartphone product. Finally, we draw out a strategic marketing recommendation for each smartphone brand based on the findings.

Dual Coalescent Energy-Efficient Algorithm for Wireless Mesh Networks

  • Que, Ma. Victoria;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.6
    • /
    • pp.760-769
    • /
    • 2007
  • In this paper, we consider a group mobility model to formulate a clustering mechanism called Dual Coalescent Energy-Efficient Algorithm (DCEE) which is scalable, distributed and energy-efficient for wireless mesh network. The differences of the network nodes will be distinguished to exploit heterogeneity of the network. Furthermore, a topology control, that is, adjusting the transmission range to further reduce power consumption will be integrated with the cluster formation to improve network lifetime and connectivity. Along with network lifetime and power consumption, clusterhead changes will be measured as a performance metric to evaluate the. effectiveness and robustness of the algorithm.

  • PDF

Fuzzing-based Vulnerability Analysis for Multimedia Players on Android Smartphones (안드로이드 스마트폰에서 퍼징 기반의 멀티미디어 플레이어 취약점 분석)

  • Kim, Dong-Jin;Moon, Jae-Chan;Park, Yeong-Ung;Cho, Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.324-327
    • /
    • 2011
  • 스마트폰과 무선인터넷 상에서 멀티미디어 사용이 일반화되면서, 스마트폰 환경에서 멀티미디어 관련 취약점을 악용한 공격이 급증하고 있다. 이러한 취약점을 악용한 공격을 예방하기 위해, 퍼징(Fuzzing)을 적용하여 취약점을 미리 발견하려는 연구들이 진행되고 있다. 본 논문에서는 '임의 생성 기반 퍼징'(단순랜덤, simple random) 방법과 '구조적 변이 기반 퍼징'(구조적 변이, structured mutation) 방법을, 안드로이드 스마트폰용 멀티미디어 플레이어에 적용하는 실험을 수행하였다. 또한 PC 환경의 멀티미디어 플레이어들에서 발생했던 기존 취약점을 악용한 공격파일(exploit)을 안드로이드 스마트폰 환경의 멀티미디어 플레이어들에 적용하고 그 결과를 분석하였다. 실험 결과, PC 환경에서는 구조적 변이 퍼징이 효과적인데 비해, 안드로이드 스마트폰 환경에서는 단순 랜덤 퍼징이 효과적임을 알 수 있었다.

How to Establish Acute Myeloid Leukemia Xenograft Models Using Immunodeficient Mice

  • Shan, Wu-Lin;Ma, Xiao-Ling
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.12
    • /
    • pp.7057-7063
    • /
    • 2013
  • The discovery of the immunodeficient mice has provided a tool for establishing animal models as hosts for in vivo analysis of AML. Various model systems have been established in the last few decades, and it is essential that murine AML models are developed to exploit more specific, targeted therapeutics. In this review, we concentrate on the models of AML and discuss the development of immunodeficiency models for understanding of leukemogenesis, describe those now available and their values and document the methods used for establishing and identifying AML mice models, as well as factors influencing engraftment of human AML in immunodeficient mice. Thus, the function of this article is to provide clinicians and experimentalists with a chronological, comprehensive appraisal of all AML model systems.